-
Our growing dependence on computer systems and the data they contain makes us increasingly exposed to hackers' attacks and prone to losing these systems should there be and accident or natural disaster. Although IT system security's are improved. Despite the fact that IT systems are improving, more complex attack methods are being created.
-
Demonstrate knowledge and understanding of technical language, security threats, system vulnerabilities and security protection methods, and implications resulting from successful threats.
-
Analyse forensic evidence data and information to identify security breaches and manage security incidents.
-
Evaluate protection methods and security documentation to make reasoned judgements and draw conclusions about their efficiency.
-
Be able to plan a secure computer network and manage security incidents with appropriate justifications.
-
It's also critical that businesses have solid procedures in place to deal with a cybersecurity problem before it happens. All IT workers must have a thorough awareness of current system risks, how to implement suitable and effective security measures, and how to handle a cyber security event.
-
Apply knowledge and understanding of security threats, system vulnerabilities and security protection methods and implications in order to risk assess systems and select appropriate tools to secure them.
-
- Cybersecurity intro
- Cisco Chapter 1 and quiz
-
- Vulnerability Database - A vulnerability database is a platform for storing, preserving, and sharing information on computer security flaws that have been found.
- White, Grey & Black Hat Hackers
- Vendor Neutral
- CCAr, CCIE, CCNP, CCNA
-
AAA :
Authentication- To be able to perform strong authentication, at least two or all three of the authentication methods of something a person knows, something a person has and something a person is must be used
Authorization - Authorization entails establishing what the authorized identity has access to, thereby determining what they can do.
Accounting - Accounting cybersecurity practices guarantee that sensitive data is protected
integrity
Sneakernet -
Malware is installed on the end devices of users by cyber thieves.
Malware and malicious code- Malware (malicious software) is any programme that is created with the aim of causing harm to a computer, server, client, or network. In contrast, software that causes unintentional harm as a result of a flaw is sometimes referred to as a software bug. -
Authentication- To be able to perform strong authentication, at least two or all three of the authentication methods of something a person knows, something a person has and something a person is must be used
Authorization - Authorization entails establishing what the authorized identity has access to, thereby determining what they can do.
Accounting - Accounting cybersecurity practices guarantee that sensitive data is protected -
Symmetric encryption encrypts and decrypts an encrypted email using a private key. Asymmetric encryption encrypts the message using the recipient's public key. If the receiver wishes to decode the communication, a private key will be needed.
Symmetric examples:
- 3DES
- IDEA
- AES
Asymmetric Examples:
- RSA (Rivest_Shamir-Adleman)
- Diffie-Hellman
- Elgamal
- Elliptic Curve Cryptography (ECC)
Access Controls:
Physical Access Controls
Logical Access Controls
Administrative Access Controls -
Malware & Malicious Code
Viruses - A virus is malicious executable code attached to another executable file, such as a legitimate program. Most viruses require end-user initiation, and can activate at a specific time or date.
Worms - Worms are malicious code that replicates by independently exploiting vulnerabilities in networks. Worms usually slow down networks. Whereas a virus requires a host program to run, worms can run by themselves. -
Steganography is the art of concealing a secret message within (or even on top of) a non-secret object. That something can be anything you want it to be. Many instances of steganography nowadays include hiding a secret piece of text within an image. Alternatively, you might hide a secret message or script inside a Word or Excel document.
Hashing is a data integrity mechanism that takes binary data (the message) and converts it into a hash value or message digest -
Symmetric encryption encrypts and decrypts an encrypted email using a private key. Asymmetric encryption encrypts the message using the recipient's public key. If the receiver wishes to decode the communication, a private key will be needed.
Access Controls:
Physical Access Controls
Logical Access Controls
Administrative Access Controls -
Converting Binary to Decimals
Becoming Familiar with Assignments -
Binary to Decimals Activity
Five-nines availability or 99. 999% is the percentage of a time network component or service is accessible to a user in a given period, usually defined as a year.
Examples:
- Security
- NHS
- Search engines (Google, Yahoo etc.)
- YouTube
- Netflix
A single point of failure is a component in a system that, if it fails, renders the entire system inoperable -
Cisco Packet Tracer lab A file transfer protocol (FTP) is a method of downloading, uploading, and transferring data from one point to another over the internet and between computer systems. FTP allows files to be sent back and forth between computers or over the cloud. FTP transfers need users to have an internet connection. Configuring basic server components :
FTP SERVER
WEB SERVER
EMAL SERVER
DNS SERVER
NTP SERVER
AAA SERVER -
Completing Lab1
Close to completing lab 2
Starting the workbook revision guide -
Introduction to Cybersecurity Test paper
10 thoughts:
- Risk assessment - View of the current state of the organization’s security, findings and recommendations for improving its overall security
- Considering threats, vulnerabilities, risks and protection measures
- Actions needing to be taken based on the risks
- reason for action
- I will need to plan what i will do with the given time -
Cybersecurity and incident management test paper A
Risk assessment
Threat 1 Summary
Mobile Malware -
Visitors connecting the network, Risk of exposing network to malware whether or not it is accidental
Threat 2 Summary
Unauthorized access -
Not changing the locks makes BCTAA more susceptible to break ins. Mistakes from the previous company regarding can be brought over which is too big of a liability. -
Test paper introduction
Risk assessment - View of the current state of the organization’s security, findings and recommendations for improving its overall security -
The phrase open port is used in security to refer to a TCP or UDP port number that is set to accept packets. Network address translation is a term that refers to the process of translating an IP address into It's a method of mapping numerous private local addresses to a public one before sending data. Most home routers, as well as most businesses, use NAT to allow many devices to share a single IP address. A honeypot is a computer or computer system designed to imitate cyberattack targets.
-
Cisco Packet Tracer Lab 4
Examining the integrity of a number of different sources To confirm that files have not been tampered with, hashes are used. I submitted any files suspected of being tampered with to Sally's computer for additional inspection. -
Description too long, added as an image instead*